• Tiada Hasil Ditemukan

FOR DETERMINISTIC NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS

N/A
N/A
Protected

Academic year: 2022

Share "FOR DETERMINISTIC NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS "

Copied!
39
0
0

Tekspenuh

(1)

The copyright © of this thesis belongs to its rightful author and/or other copyright owner. Copies can be accessed and downloaded for non-commercial or learning purposes without any charge and permission. The thesis cannot be reproduced or quoted as a whole without the permission from its rightful owner. No alteration or changes in format is allowed without permission from its rightful owner.

(2)

ENERGY EFFICIENT CHAIN BASED ROUTING PROTOCOL

FOR DETERMINISTIC NODE DEPLOYMENT IN WIRELESS SENSOR NETWORKS

HAYDAR ABDULAMEER MARHOON

DOCTOR OF PHILOSOPHY UNIVERSITI UTARA MALAYSIA

2017

(3)

.

. .

. . I . I . : Awang H a d Salleh

. ,, .. ,I Graduate School

,. .

, # . I a ' ofiArts And Sciences

. .

w , .. ,. , , -, . . . . . . . . .. , .. , . , .. . , . . . . , .

U n l v e r s i t i 'USara Malaysia

. . PERAKUAN K E R J A TESlS I D l S E R T A S l

(certification o f t h e s i s / dissertation)

Kami, yang bertandatangan, memperakukan bahawa (We, the undersigned, certify fhaf)

HAYDAR ABDULAMEER MARHOON ..

calon untuk ljazah PhD

(candidafe for the degree of)

telah mengemukakan tesis 1 disertasi yang bertajuk:

(has presented hidher thesis / dissertation of the following title):

"ENERGY EFFICIENT CHAIN BASED ROUTING PROTOCOL FOR DETERMINISTIC . NODE DEPLOYMENT IN WIRELESS SENSOR NETWORK"

. .

seperti yang tercatat di muka surat tajuk dan kulit tesis I disertasi.

(as it appears on fhe fitle page and fronf cover of fhe thesis /dissertation).

Bahal~a tesisldisertasi tersebut boleh diterima dari segi bentuk serta kandungan dan meliputi bidang ilmu dengan memuaskan, sebagaimana yang ditunjukkan oleh calon dalam ujian lisan yang diadakan pada : 27 Julai 20f6.

Thsf the said fhesis/dissertafion

b

acceptable in form and confent and displays a satisfactory knowledge of the fieM of sfudy as demonstrafed by the candidate fhrough an oral examination held on:

July 27, 2016.

Pengerusi Viva: Prof. Dr.,Ku Ruhana Ku Maharnud. ~andatangan

(Chairman for VIVA) (Signature)

Pemeriksa Luar: Assoc. Prof. Dr. Shaiful Jahari Hashim Tandatangan

. (External Examiner) (Signature)

ALL

,

Pemeriksa Dalam: Dr. Adib Habbal

. (Internal Examiner)

Nama PenyelialPenyelia-penyelia: Dr. blassudi Mahrnuddin (Name of ;~upenlisor/~upenlisors)

~ a h a ~en~elial~enyelia-penyelia: Dr. Shahrudin Awang Nor ' . (Name . of .. Supenlisor/Supenlisors)

. ~ a n d a i n i a n (Signature)

w,

~arikh: . .

(Date) July 2 f , 2016

(4)

i

Permission to Use

In presenting this thesis in fulfilment of the requirements for a postgraduate degree from Universiti Utara Malaysia, I agree that the Universiti Library may make it freely available for inspection. I further agree that permission for the copying of this thesis in any manner, in whole or in part, for scholarly purpose may be granted by my supervisor(s) or, in their absence, by the Dean of Awang Had Salleh Graduate School of Arts and Sciences. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to Universiti Utara Malaysia for any scholarly use which may be made of any material from my thesis.

Requests for permission to copy or to make other use of materials in this thesis, in whole or in part, should be addressed to:

Dean of Awang Had Salleh Graduate School of Arts and Sciences UUM College of Arts and Sciences

Universiti Utara Malaysia 06010 UUM Sintok

(5)

ii

Abstrak

Rangkaian sensor tanpa wayar (WSN) terdiri daripada sensor peranti kecil yang dihubungi secara tanpa wayar untuk tujuan penderiaan dan pengiriman data kepada stesen pengkalan (BS). Protokol penghalaan dalam WSN telah menjadi bidang aktif bagi penyelidik dan industri disebabkan oleh potensi pengiriman data, dan keupayaannya meningkatkan jangka hayat rangkaian, mengurangkan kelewatan, dan penjimatan tenaga nod.Berdasarkan pendekatan hiraki, asas rantaian protokol rutin adalah jenis berpotensi yang berupaya memanjangkan jangka hayat rangkaian dan mengurangkan penggunaan tenaga. Namun, ia masih mempunyai kelemahan seperti kelewatan, kelewahan data, jarak panjang antara jiran, kepala rantaian (CH) pengunaan turus tenaga, dan cerutan. Kajian ini mencadangkan Seragam Asas Rantaian Rutin Protokol (DCBRP) untuk penyeragaman penempatan nod, yang terdiri daripada Mekanisme Pembinaan Tulang Belakang (BCM), mekanisme Pemilihan Ketua Rantaian (CHS) dan mekanisme Sambungan Seterusnya Hop (NHC).

Mekanisma BCM bertangungjawab untuk pembinaan rantaian menggunakan pendekatan konsep pelbagai rantaian, dimana ia membahagikan rangkaian ini ke bilangan kluster yang khusus bergantung kepad bilangan jalurnya. Manakala mekanisma CHS bertanggungjawab kepada kepala rantaian, dan pemilihan nod kepala rantaian ditentukan oleh keupayaannya untuk penyerahan data. Pada masa sama, mekanisma NHC bertanggungjawab kepada sambungan hop seterusnya dalam setiap kepala baris berdasarkan kepada tenaga dan jarak antara nod untuk menyingkir nod yang lemah daripada berada dalam rantaian utama.

Network Simulator 3 (ns-3) digunakan untuk mensimulasikan DCBRP dan ia dinilai dengan protokol penghalaan terdekat dalam penempatan berketentuan dalam WSN, yang merangkumi protokol Rangkaian Kluster Campuran (CCM) dan Protokol Berasaskan Rantaian Dua Peringkat (TSCP). Hasil menunjukkan bahawa pencapaian DCBRP mengatasi CCM dan TSCP dari segi kelewatan hujung dengan hujung, penggunaan tenaga CH, penggunaan tenaga keseluruhan, jangka hayat rangkaian dan metric tenaga*kelewatan.

DCBRP atau salah satu daripada mekanismenya membantu aplikasi WSN dengan melanjutkan hayat nod sensor dan menjimatkan tenaga untuk tujuan pengesanan seberapa lama yang boleh.

Kata kunci: Rangkaian sensor tanpa wayar, Rangkaian berpusat pendekatan, Seragam nod penempatan, Hierarki penghalaan protokol

(6)

iii

Abstract

Wireless Sensor Network (WSN) consists of small sensor devices, which are connected wirelessly for sensing and delivering specific data to Base Station (BS). Routing protocols in WSN becomes an active area for both researchers and industrial, due to its responsibility for delivering data, extending network lifetime, reducing the delay and saving the node’s energy. According to hierarchical approach, chain base routing protocol is a promising type that can prolong the network lifetime and decrease the energy consumption. However, it is still suffering from long/single chain impacts such as delay, data redundancy, distance between the neighbors, chain head (CH) energy consumption and bottleneck. This research proposes a Deterministic Chain-Based Routing Protocol (DCBRP) for uniform nodes deployment, which consists of Backbone Construction Mechanism (BCM), Chain Heads Selection mechanism (CHS) and Next Hop Connection mechanism (NHC). BCM is responsible for chain construction by using multi chain concept, so it will divide the network to specific number of clusters depending on the number of columns. While, CHS is answerable on the number of chain heads and CH nodes selection based on their ability for data delivery. On the other hand, NHC is responsible for next hop connection in each row based on the energy and distance between the nodes to eliminate the weak nodes to be in the main chain. Network Simulator 3 (ns-3) is used to simulate DCBRP and it is evaluated with the closest routing protocols in the deterministic deployment in WSN, which are Chain- Cluster Mixed protocol (CCM) and Two Stage Chain based Protocol (TSCP). The results show that DCBRP outperforms CCM and TSCP in terms of end to end delay, CH energy consumption, overall energy consumption, network lifetime and energy*delay metrics.

DCBRP or one of its mechanisms helps WSN applications by extending the sensor nodes lifetime and saving the energy for sensing purposes as long as possible.

Keywords: Wireless sensor network, Chain-based approach, Deterministic node deployment, Hierarchical routing protocol

(7)

iv

Acknowledgement

In the Name off Allah, the Most Gracious and Most Merciful

“My Deepest Gratitude is Dedicated to Allah SwT”

Finishing this study took a lot of efforts and sacrifices than I had expected. This study could not have been completed without the support and help of many people who have contributed one way or the other towards the completion of this study.

I am greatly indebted to my supervisors: Dr.Massudi Mahmuddin and Dr. Shahrudin Awang Nor, who have given me lots of encouragement and advice during my study.

They have always given me continuous, constructive, and valuable guidance, comments, and advices throughout the process of completing this thesis. My supervisors have not only been my supervisors or lecturers and advisors throughout my study, but equally they have been brothers and friends as well.

A lot of thanks and appreciations are to all Unversiti Utara Malaysia staff, especially to staff of School of Computing for their support. In addition, I extend my appreciation to all the InterNetWorks Research Group for dissections, notes, and advices during my research, especially the Chairman Prof. Dr. Suhaidi Hassan and Dr. Adib Habbal.

My thanks also go to Sultanah Bahiyah Library, Universiti Utara Malaysia staff members who have also helped me in this research. In addition, I would like to express my sincere appreciation to all UPM library staff and to Prof. Dato Dr. Kamel Arifin, Dean of Institute for Mathematical Research for his valuable time spent to discuss the mathematical model of BCM mechanism and notations given.

I am also deeply grateful to my parents who have supported and taught me the value of education. I also like to extend my heartfelt thanks to my brother and sisters for always being with me throughout the study.

Last but not least, I would also like to thank my friends Rafid, Raaid, Atheer, and

Mohanad who have always encouraged me to complete this research. Special thanks

(8)

v

go to all other individuals who have contributed to this study. They contributed and shared their efforts, time, and ideas to this study. Thank you all. May Allah bless ALL of you.

Dedicated to

As a remembrance of my father, Mr. Abdulameer Marhoon, who passed away in July, 2016

and

My family— my wife, Hussein, Abdulameer, Ali and Mohammed, my brilliant sons

(9)

vi

Table of Contents

Permission to Use ... i

Abstrak ... ii

Abstract ... iii

Acknowledgement ... iv

Table of Contents ... vi

List of Tables ... x

List of Figures ... xi

List of Abbreviations ... xiii

CHAPTER ONE INTRODUCTION ... 1

1.1 Background ... 1

1.2 Research Motivations ... 4

1.3 Problem Statement ... 5

1.4 Research Questions ... 7

1.5 Research Objective... 7

1.6 Scope of the Research ... 8

1.7 Significance of Study ... 9

1.8 Thesis Outline ... 10

CHAPTER TWO LITERATURE REVIEW ... 12

2.1 Background ... 12

2.1.1 WSN Sensor Deployment ... 13

2.1.2 OSI and WSN Stacks ... 16

2.1.3 IEEE 802.15.4 Standard ... 17

2.1.4 WSN Applications ... 18

2.2 Routing in Wireless Sensors Networks ... 21

2.3 Hierarchical Routing Protocols ... 22

2.4 Cluster-Based Routing Protocols ... 24

2.4.1 Low-Energy Adaptive Clustering Hierarchy ... 25

2.4.2 Energy-Efficient LEACH ... 27

2.5 Chain-Based Routing Protocols ... 28

2.5.1 Chain-based Routing Protocol Characteristics ... 29

(10)

vii

2.5.2 Power-Efficient Gathering in Sensor Information Systems ... 30

2.5.3 Chain Routing Based on Coordinates-oriented Cluster ... 33

2.5.4 A Reliable and Energy-Efficient Chain-Cluster Based Protocol ... 35

2.5.5 Balanced Chain-Based Routing Protocol ... 37

2.5.6 Chain-Based1 & Chain-Based2 ... 38

2.5.7 Clustered Chain based Power Aware Routing ... 40

2.5.8 Energy Efficient Chain-Based Routing Protocol ... 42

2.5.9 Grid-PEGASIS ... 44

2.5.10 Rotation PEGASIS Based Routing Protocol ... 46

2.5.11 An Energy Efficient Cluster-Chain Based Routing Protocol... 48

2.5.12 Improvement Energy-Efficient PEGASIS Based ... 52

2.5.13 Chain Based Cluster Cooperation Protocol ... 54

2.6 Chain Based Routing Protocols in Deterministic Deployment in WSN ... 55

2.6.1 Chain Construction ... 56

2.6.2 Chain Head and Main Head Selection ... 60

2.6.3 Next Hop Selection ... 63

2.7 Comparative Routing Protocols Table ... 64

2.8 Summary ... 72

CHAPTER THREE RESEARCH METHODOLOGY ... 73

3.1 Introduction ... 73

3.2 Design Research Methodology (DRM) ... 73

3.3 Research Clarification (RC) ... 76

3.4 Descriptive Study (DS-I) ... 77

3.5 Perspective Study (PS) ... 80

3.5.1 Phase 1: Chain Construction ... 82

3.5.2 Phase 2: Chain Heads Selection and Numbers ... 85

3.5.3 Phase 3: Next Hop Selection ... 86

3.5.4 Radio Model for Energy Consumption ... 87

3.5.5 Verification and Validations ... 89

3.6 Descriptive Study (DS-II) ... 91

3.6.1 Performance Evaluation ... 91

(11)

viii

3.6.2 Network Simulator 3 (ns-3) ... 93

3.6.3 The WSN in ns-3 ... 93

3.6.4 Simulation Setup ... 96

3.6.5 Evaluation Metrics ... 98

3.6.5.1 End-to-End Delay ... 99

3.6.5.2 Network Lifetime ... 100

3.6.5.3 Energy Consumption ... 100

3.6.5.4 Energy*Delay ... 101

3.7 Summary ... 102

CHAPTER FOUR DCBRP ROUTING PROTOCOL FOR WSN ... 103

4.1 Introduction ... 103

4.2 Backbone Construction Mechanism (BCM) ... 104

4.2.1 The Design of BCM Mechanism ... 104

4.2.2 The Implementation of BCM Mechanism ... 114

4.2.3 The Verification and Validation of BCM Mechanism... 117

4.2.3.1 Validation of Mathematical Model of BCM ... 118

4.2.3.2 Validation of BCM in PEGASIS Protocol ... 120

4.3 Chain Head Selection Mechanism (CHS) ... 121

4.3.1 The Design of CHS Mechanism ... 123

4.3.2 The Implementation of CHS Mechanism ... 126

4.3.3 The Verification and Validation of CHS Mechanism ... 128

4.3.3.1 Validation of CHS

factor

Equation... 129

4.3.3.2 Validation of CHS in PEGASIS Protocol ... 131

4.4 Next Hop Connection Mechanism (NHC) ... 131

4.4.1 The Design of NHC Mechanism ... 135

4.4.2 The Implementation of NHC Mechanism ... 140

4.4.3 The Verification and Validation of NHC Mechanism ... 141

4.4.3.1 Validation of NHC

factor

Equation ... 142

4.4.3.2 Validation of NHC in PEGASIS Protocol ... 144

4.5 Summary ... 145

(12)

ix

CHAPTER FIVE DCBRP PERFORMANCE EVALUATIONS ... 147

5.1 Introduction ... 147

5.2 Evaluation of DCBRP with Data Fusion Scenario ... 147

5.2.1 Network Lifetime ... 148

5.2.2 Energy Consumption ... 150

5.2.3 End-to-End Delay ... 154

5.2.4 Energy*Delay Metric ... 156

5.3 Evaluation of DCBRP without Data Fusion Scenario ... 158

5.3.1 Network Lifetime ... 159

5.3.2 Energy consumption ... 160

5.3.3 End-to-End Delay ... 165

5.3.4 Energy*Delay ... 168

5.4 Summary ... 170

CHAPTER SIX CONCLUSION AND FUTURE WORKS ... 171

6.1 Research Conclusion ... 171

6.2 Limitation and Future Works ... 175

REFERENCES ... 177

(13)

x

List of Tables

Table 2.1: Comparative Table for Routing Protocols in WSN ... 65

Table 3.1: Simulator Parameters ... 97

Table 4.1: BCM Mechanism Requirements Depends on no. of Columns ... 106

Table 4.2: Validation Result from ns-3 Simulator and MALAB Tools ... 119

Table 4.3: Validation of BCM inside PEGASIS Protocol ... 120

Table 4.4: CHSfactor Obtained from ns-3 for Different Rounds ... 129

Table 4.5: Validation of CHS inside PEGASIS Protocol ... 131

Table 4.6: The Difference of Next Hop Selection’s strategies ... 138

Table 4.7: Next Hop Connection for Node11 ... 143

Table 4.8: Validation of NHC inside PEGASIS Protocol... 144

(14)

xi

List of Figures

Figure 1.1: Routing Protocols in WSN ... 3

Figure 1.2: Nodes Connections in WSN ... 4

Figure 2.1: Basic Architecture for Sensor Node in WSN (Adopted From [31] ) ... 13

Figure 2.2: Deployment Strategies in WSN ... 15

Figure 2.3: WSN Protocol Stack ... 16

Figure 2.4: WSN Applications in Different Area ... 19

Figure 2.5: Hierarchical Routing Protocols in WSN ... 24

Figure 2.6: Clustering Process in one Round ... 24

Figure 2.7: Typical Topology for LEACH ... 26

Figure 2.8: PEGASIS Protocol Topology ... 31

Figure 2.9: CRBCC Routing Protocol ... 34

Figure 2.10: REC+ Routing Protocol ... 35

Figure 2.11: BCBRP Routing Protocol ... 38

Figure 2.12: (a) Chain-Based1 Routing (b) Chain-Based2 Routing Protocol ... 39

Figure 2.13: CCPAR Protocol ... 40

Figure 2.14: (a) Chain by PEGASIS (b) Chain by EECB ... 43

Figure 2.15: Grid-PEGASIS Protocol (a) DT and (b) IGR ... 45

Figure 2.16: Chain Constructing by RPB Protocol ... 47

Figure 2.17: ECCP Routing Protocol ... 50

Figure 2.18: IEEPB Routing Protocol ... 52

Figure 2.19: Chain and Cluster Formation in CCM ... 56

Figure 2.20: Chains Built by CCBRP Routing Protocol ... 57

Figure 2.21: Chains Constructed by TSCP Routing Protocol ... 58

Figure 3.1: DRM Research Methodology Stages ... 75

Figure 3.2: Main Steps in RC Stage ... 76

Figure 3.3: Main Steps for DS-I... 77

Figure 3.4: Conceptual Model of DCBRP Routing Protocol ... 79

Figure 3.5: Chains Constructed by First Phase in the Proposed Protocol ... 83

Figure 3.6: Chain Construction Flowcharts ... 84

Figure 3.7: Phase 2 Flowchart to Select no. of CH and CH Selection ... 86

Figure 3.8: Phase 3 Next Hop Selection Flowchart ... 87

Figure 3.9: First Order Radio Model ... 88

(15)

xii

Figure 4.1: Chains Constructed by BCM in DCBRP Protocol ... 113

Figure 4.2: Pseudo-code for First Part of BCM ... 115

Figure 4.3: Pseudo-code of Horizontal and Vertical Connection Procedure in BCM ... 117

Figure 4.4: CHS Mechanism in DCBRP Routing Protocol ... 126

Figure 4.5: Pseudo-code for CHS for DCBRP Routing Protocol ... 128

Figure 4.6: The Main Drawback in the Next Hop Connection by Greedy ... 133

Figure 4.7: The Drawback in Select the Shortest Path in WSN Routing Protocols ... 134

Figure 4.8: Selecting the Next Hop by NHCfactor in DCBRP protocol ... 137

Figure 4.9: The Connection Changed by NHC Mechanism ... 139

Figure 4.10: Pseudo-code of NHC in DCBRP Routing Protocol ... 141

Figure 5.1: Network Lifetime of DCBRP with Data fusion ... 149

Figure 5.2: Energy Consumption of DCBRP, TSCP and CCM ... 151

Figure 5.3: Remaining Energy for all nodes in DCBRP, TSCP and CCM ... 152

Figure 5.4: Average Energy Consumption in DCBRP, TSCP and CCM ... 153

Figure 5.5: Average End-to-End Delay for DCBRP, TSCP and CCM (FND) ... 155

Figure 5.6: Average End-to-End Delay for DCBRP, TSCP and CCM (LND) ... 156

Figure 5.7: Energy*Delay for DCBRP, TSCP and CCM ... 157

Figure 5.8: Overall Energy*Delay for DCBRP, TSCP and CCM ... 158

Figure 5.9: The Network Lifetime for DCBRP, TSCP and CCM ... 159

Figure 5.10: Energy Consumption for DCBRP, TCSP and CCM ... 162

Figure 5.11: Average Energy Consumption for all Nodes and CHs nodes ... 164

Figure 5.12: Average End-to-End Delay for DCBRP, TSCP and CCM (FND) ... 166

Figure 5.13: Average End-to-End Delay for DCBRP, TSCP and CCM (LND) ... 168

Figure 5.14: Energy*Delay Metric for DCBRP, TSCP and CCM Protocols ... 169

Figure 6.1: Packets Routing by DCBRP Protocol ... 173

(16)

xiii

List of Abbreviations

ACO - Ant Colony Optimization

BCBRP - Balancing Chain-Based Routing Protocol

BCM - Backbone Construction Mechanism

BS - Base Station

CCBRP - Chain-Chain Based Routing Protocol

CCM - Chain-Cluster Mixed

CCPAR - Cluster Chain Based Power Aware Routing

CDT - C/C++ Developing Tools

CH - Chain Head or Cluster Head

CHS - Chain Head Selection mechanism

CRBCC - Chain Routing Based on Coordinates-oriented Cluster CSMA - Carrier Sense Multiple Access

DCBRP - Deterministic Chain-Based Routing Protocol

DD - Direct Diffusion

DRINA - Data Routing For in-Network Aggregation

DRM - Design Research Methodology

DS-I - Descriptive Study 1

DS-II - Descriptive Study 2

DSP - Deterministic Sensor Placement

DT - Deterministic Topology

EAR - Energy Aware Routing

ECCP - Energy Efficient Cluster-Chain Based Protocol

EECB - Energy Efficient Chain Based Routing Protocol

(17)

xiv

FND - First Node Die

GPS - Global Position System

HHR - Hop-by-Hop Reliability

IEEE - Institute of Electrical and Electronic Engineering IEEPB - Improvement Energy Efficient PEGASIS Based

IGR - Intra-Grid Random

IoT - Internet of Thing

ISO - International Organization of Standardization LEACH - Low Energy Adaptive Clustering Hierarchy

LL - Long Link

LND - Last Node Die

LR-WPAN - Low Rate Wireless Personal Area Network

MAC - Media Access Control

MN - Member Node

NHC - Next Hop Connection mechanism

NS-3 - Network Simulator 3

ON - Ordinary Node

OSI - Open System Interconnection

PEGASIS - Power Efficient Gathering in Sensor information System

PS - Perspective Study

QoS - Quality of Service

RC - Research Clarification

REC+ - Reliable and Energy Efficient Chain-Cluster Protocol

RNs - Relay Nodes

RPB - Rotation PEGASIS Based Routing Protocol

(18)

xv

SAT - Secure Aggregation Tree

SN - Sensor Node

SPIN - Sensor Protocol Information Negotiation

TCP - Transport Control Protocol

TDMA - Time Diffusion Media Access

TSCP - Two Stage Chain Protocol

UDP - User Datagram Protocol

WSN - Wireless Sensor Network

(19)

CHAPTER ONE INTRODUCTION

1.1 Background

Wireless Sensor Network (WSN) as the name implies, refers to a number of small sensor devices, which are connected to each other wirelessly. WSN applications are widely used in several areas. These include industrial domain, military institutions, habitat monitoring, environmental establishments and disaster management [1]. The main components of a WSN are the sensor nodes which have many limitations in its characteristics. These include, the power resources, computational capabilities, bandwidth and memory [2]. These nodes have the capability of communicating with each other. The communications are also established between one or more super nodes known as the Base Station (BS). This BS is thus connected to the Internet.

Each distinct node has a built in sensor devices for a specific task (one or more task).

The sensors consists of a radio module used in sending data through the wireless medium, a micro controller for processing, and the power supply component for providing the necessary energy for all mechanism in the devices [3]. Typically, batteries are the main source of power in the sensor nodes and consequently, due to its deployment, recharging seems a difficult task. WSN nodes also have particular level of algorithms intelligence used in collecting and transmitting data to the BS [4].

Routing is one of the most pertinent perplexing issues that directly affect the

performance of WSN. Proportionally; the main goal of the routing protocols in WSN

is to deliver all sensing data to the base station with minimum power consumption to

extend the lifetime of the network's nodes. Different factors have been identified to

(20)

The contents of the thesis is for

internal user

only

(21)

177

REFERENCES

[1] G. Sikander, “A Survey of Cluster-based Routing Schemes for Wireless Sensor Networks,” The Smart Computing Review, vol. 3, no. 4, pp. 261–275, Aug. 2013.

[2] N. Gautam, W.-I. Lee, and J.-Y. Pyun, “Track-Sector Clustering for Energy Efficient Routing in Wireless Sensor Networks,” 2009 Ninth IEEE International Conference on Computer and Information Technology, pp. 116–121, 2009.

[3] M. Hadjila, H. Guyennet, and M. Feham, “A Chain-Based Routing Protocol to Maximize the Lifetime of Wireless Sensor Networks,” Wireless Sensor Network, vol.

05, no. 05, pp. 116–120, 2013.

[4] C. Wei, J. Yang, and Y. Gao, “Cluster-based routing protocols in wireless sensor networks: A survey,” Proceedings of 2011 International Conference on Computer Science and Network Technology, pp. 1659–1663, Dec. 2011.

[5] Salman, S. Shukla, S. Awasthi, R. S. Singhal, and A. K. Tripathi, “A comparative analysis among routing protocols based on factors affecting the Wireless Sensor Networks,” 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 866–871, Feb. 2014.

[6] G. Qiao and J. Zeng, “A Position-Based Chain Cluster Routing Protocol for Strip Wireledd Sensor Network,” Springer-Verlag Berlin Heidelberg, vol. 2, no. 159, pp.

189–194, 2011.

[7] X. Liu, “A survey on clustering routing protocols in wireless sensor networks.,”

Sensors (Basel, Switzerland), vol. 12, no. 8, pp. 11113–53, Jan. 2012.

[8] R. Devika, B. Santhi, and T. Sivasubramanian, “Survey on Routing Protocol in Wireless Sensor Network,” International Journal of Engineering and Technology (IJET), vol. 5, no. 1, pp. 350–356, 2013.

(22)

178

[9] J. Zhang, Q. Wu, F. Ren, T. He, and C. Lin, “Effective Data Aggregation Supported by Dynamic Routing in Wireless Sensor Networks,” 2010 IEEE International Conference on Communications, pp. 1–6, May 2010.

[10] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” in Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000, vol. 00, no. c, pp.

1–10.

[11] J. Liang, J. Wang, and J. Chen, “A Delay-Constrained and Maximum Lifetime Data Gathering Algorithm for Wireless Sensor Networks,” 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, pp. 148–155, 2009.

[12] L. A. Villas, A. Boukerche, H. S. Ramos, H. A. B. F. de Oliveira, R. B. de Araujo, and A. A. F. Loureiro, “DRINA: A lightweight and reliable routing approach for in- network aggregation in wireless sensor networks,” Computers, IEEE Transactions on, vol. 62, no. 4, pp. 676–689, 2013.

[13] Q. Mamun, S. Ramakrishnan, and B. Srinivasan, “Multi-chain oriented logical topology for wireless sensor networks,” 2010 2nd International Conference on Computer Engineering and Technology, pp. V2–367–V2–372, 2010.

[14] Q. Mamun, “A Qualitative Comparison of Different Logical Topologies for Wireless Sensor Networks,” Sensors (Basel, Switzerland), vol. 12, no. 11, pp. 14887–913, Jan.

2012.

[15] N. Nokhanji and Z. Mohd Hanapi, “A Survey on Cluster-Based Routing Protocols in Wireless Sensor Network.pdf,” Applied Sciences, pp. 2011–2022, 2014.

[16] V. B. Rajashree, P. V.C, S. R. Sawant, and M. R. R, “Classification and Comparison of Routing Protocols in Wireless Sensor Networks,” Ubiquitous Computing Security Systems, vol. 4, no. 1, pp. 704–711, 2014.

(23)

179

[17] M. Eslaminejad and S. A. Razak, “Fundamental lifetime mechanisms in routing protocols for wireless sensor networks: a survey and open issues.,” Sensors (Basel, Switzerland), vol. 12, no. 10, pp. 13508–44, Jan. 2012.

[18] H. Kareem, S. J. Hashim, S. Suberamaniam, and A. Sali, “Energy Efficient Two Stage Chain Routing Protocol (TSCP) For Wireless Sensor Networks,” Journal of Theoretical and Applied Information Technology, vol. 59, no. 2, pp. 442–450, 2014.

[19] S. Tyagi and N. Kumar, “A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks,” Journal of Network and Computer Applications, vol. 53, pp. 39–56, 2013.

[20] X. Liu, “Atypical Hierarchical Routing Protocols for Wireless Sensor Networks : A Review,” IEEE Sensors Journal, vol. 15, no. 10, pp. 5372–5383, 2015.

[21] H. Kareem, S. J. Hashim, A. Sali, and S. Subramaniam, “A Survey Of State Of The Art: Hierarchical Routing Algorithms For Wireless Sensor Networks,” Theoretical and Applied Information Technology, vol. 62, no. 3, pp. 769–781, 2014.

[22] N. T. Tung, “Energy-aware optimization model in chain-based routing,” Mobile Networks and Applications-Springer, vol. 19, no. 2, pp. 249–257, 2014.

[23] Y.-K. Chiang, N.-C. Wang, and C.-H. Hsieh, “A cycle-based data aggregation scheme for grid-based wireless sensor networks.,” Sensors (Basel, Switzerland), vol.

14, no. 5, pp. 8447–64, Jan. 2014.

[24] A. Rahman, S. Anwar, I. Pramanik, and F. Rahman, “A Survey on Energy Efficient Routing Techniques in Wireless Sensor Network,” in Advanced Communication Technology (ICACT), 2013 15th International Conference on. IEEE, 2013, pp. 200–

205.

[25] Z. Taghikhaki, N. Meratnia, and P. J. M. Havinga, “A reliable and energy-efficient chain-cluster based routing protocol for Wireless Sensor Networks,” 2013 IEEE

(24)

180

Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 248–253, Apr. 2013.

[26] S. Ganesh and R. Amutha, “Efficient and Secure Routing Protocol for Wireless Sensor Networks through SNR Based Dynamic Clustering,” Communications And Networks, vol. 15, no. 4, pp. 422–429, 2013.

[27] C. S. Lindsey, Stephanie Raghavendra, “PEGASIS : Power-Efficient GAthering in Sensor Information Systems ’,” in Aerospace conference proceedings IEEE, 2002, pp. 3–1125.

[28] S. Ali and S. Refaay, “Chain-Chain Based Routing Protocol,” International Journal of Computer Science, vol. 8, no. 3, pp. 105–112, 2011.

[29] S. Rani, J. Malhotra, and R. Talwar, “Energy efficient chain based cooperative routing protocol for WSN,” Applied Soft Computing, vol. 35, pp. 386–397, 2015.

[30] K. Konstantinos, A. Xenakis, and P. Kikiras, “Topology optimization in wireless sensor networks for precision agriculture applications,” in International Conference on Sensor Technologies and Applications, 2007, pp. 526–530.

[31] L. Ruiz-Garcia, L. Lunadei, P. Barreiro, and I. Robla, “A Review of Wireless Sensor Technologies and Applications in Agriculture and Food Industry: State of the Art and Current Trends,” Sensors (Basel), vol. 9, pp. 4728–4750, 2009.

[32] W. Y. Poe and J. B. Schmitt, “Node Deployment in Large Wireless Sensor

Networks : Coverage , Energy Consumption , and Worst-Case Delay,” in AINTEC’09 Conference Proceding, Bangkok, Thailand, 2009.

[33] S. Rana and A. Aggarwal, “Study and Comparison of Chain Based Protocol to Enhance Energy Utilization in Wireless Sensor Network,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 8, pp. 11–17, 2014.

(25)

181

[34] H. Zhang and C. Liu, “A Review on Node Deployment of Wireless Sensor Network,”

IJCSI International Journal of Computer Science, vol. 9, no. 6, pp. 378–383, 2012.

[35] G. Huang, D. Chen, and X. Liu, “A Node Deployment Strategy for Blindness

Avoiding in Wireless Sensor Networks,” IEEE COMMUNICATIONS LETTERS, vol.

19, no. 6, pp. 1005–1008, 2015.

[36] X. Liu, “A Deployment Strategy for Multiple Types of Requirements in Wireless Sensor Networks,” IEEE TRANSACTIONS ON CYBERNETICS, vol. 45, no. 10, pp.

2364–2376, 2015.

[37] L. P. Damuut, “A Survey of Deterministic Vs . Non-Deterministic Node Placement Schemes in WSNs,” in The Sixth International Conference on Sensor Technologies and Applications, 2012, no. c, pp. 154–158.

[38] S. Meguerdichian, F. Koushanfar, G. Qu, and M. Potkonjak, “Exposure in wireless Ad-Hoc sensor networks,” Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom ’01, pp. 139–150, 2001.

[39] J. Li, L. L. H. Andrew, C. H. Foh, M. Zukerman, and H.-H. Chen, “Connectivity, coverage and placement in wireless sensor networks.,” Sensors (Basel, Switzerland), vol. 9, no. 10, pp. 7664–93, Jan. 2009.

[40] Y. Shuang-Hua, Wireless Sensor N etworks: Principles, Design and Applications.

Springer London Heidelberg New York Dordrecht, 2013.

[41] M. Kuorilehto, M. Kohvakka, J. Suhonen, H. Panu, H. Marko, and T. D. H, Ultra- Low Energy Wireless Sensor Networks in Practice Theory, Realization and Deployment. U.S.A: John Wiley &Sons, Ltd, 2007.

[42] S. Khan, A.-S. K. Pathan, and N. A. Alrajeh, Wireless Sensor Networks, Current Status and Future Trends. Taylor & Francis Press, 2013.

(26)

182

[43] J. Suhonen, M. Kohvakka, V. Kaseva, T. D. Hämäläinen, and M. Hännikäinen, Low- Power Wireless Sensor Networks: Protoc ls, Services and Applicationso. New York Dordrecht Heidelberg London: Springer, 2012.

[44] B. Krishnamachari, Networking Wireless Sensors: Sleep-oriented MAC – Efficient Routing Data-centric Concepts – Congestion Control. New York: cambridge university press, 2005.

[45] Aqeel-ur-Rehman and Z. A. Shaikh, “Smart Agriculture,” in Application of Modern High Performance Networks, Bentham Science Publishers Ltd., 2009, pp. 120–129.

[46] Aqeel-ur-Rehman, A. Z. Abbasi, N. Islam, and Z. A. Shaikh, “A Review of Wireless Sensors and Networks’ Applications in Agriculture,” Computer Standards &

Interfaces, 2011.

[47] C. Li, H. Zhang, B. Hao, and J. Li, “A Survey on Routing Protocols for Large-Scale Wireless Sensor Networks,” Sensors (Basel, Switzerland), vol. 11, no. 4, pp. 3498–

3526, 2011.

[48] H. Singh and N. Kaur, “Energy Efficiency Techniques for Wireless Sensor Networks : A Review,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 5, pp. 4138–4142, 2014.

[49] A. M. Shamsan Saleh, B. M. Ali, M. F. a Rasid, and A. Ismail, “A self-optimizing scheme for energy balanced routing in Wireless Sensor Networks using SensorAnt.,”

Sensors (Basel, Switzerland), vol. 12, no. 8, pp. 11307–33, Jan. 2012.

[50] X. Liu, “Sensor Deployment of Wireless Sensor Networks Based on Ant Colony Optimization with Three Classes of Ant Transitions,” IEEE Communications Letters, vol. 16, no. 10, pp. 1604–1607, Oct. 2012.

[51] W. Liu and Y. Wu, “Routing protocol based on genetic algorithm for energy harvesting-wireless sensor networks,” IET Wireless Sensor Systems, vol. 3, pp. 112–

(27)

183 118, 2013.

[52] K. Bennani, D. Elghanami, and A. Maach, “Energy-Efficient Clustering Based On Hybrid Evolutionary Algorithm In Wireless Sensor Network,” Journal of Theoretical and Applied Information Technology, vol. 58, no. 1, pp. 140–146, 2013.

[53] V. Choudhary and K. Mahajan, “Energy- Efficient Protocols in Wireless Sensor Networks : A Survey,” Journal of Engineering (IOSRJEN), vol. 04, no. 06, pp. 39–

43, 2014.

[54] V. Singhal and S. Suri, “Comparative Study of Hierarchical Routing Protocols in Wireless Sensor Networks,” no. 5, pp. 2–7, 2014.

[55] G. H. Raghunandan and B. N. Lakshmi, “A comparative analysis of routing

techniques for Wireless Sensor Networks,” 2011 National Conference on Innovations in Emerging Technology, pp. 17–22, Feb. 2011.

[56] S. Singh, M. Woo, and C. S. Raghavendra, “Power-aware routing in mobile ad hoc networks,” Proceedings of the 4th annual ACMIEEE international conference on Mobile computing and networking MobiCom 98, vol. 12, pp. 181–190, 1998.

[57] Z. J. Haas, J. Y. Halpern, and L. Li, “Gossip-based ad hoc routing,” in

Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002, vol. 3, pp. 1707–1716.

[58] J. Kulik, W. Heinzelman, and H. Balakrishnan, “Negotiation-based protocols for disseminating information in wireless sensor networks,” Wireless Networks, vol. 8, pp. 169–185, 2002.

[59] D. Braginsky and D. Estrin, “Rumor routing algorithm for sensor networks,” in WSNA ’02. Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, 2002, pp. 22–31.

(28)

184

[60] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, “Directed diffusion for wireless sensor networking,” Networking, IEEE/ACM T ransactions on, vol. 11, pp. 2–16, 2003.

[61] B. Karp and H. Kung, “GPSR: Greedy Perimeter Stateless Routing for wireless networks,” in Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000, pp. 243–254.

[62] R. C. Shah and J. M. Rabaey, “Energy aware routing for low energy ad hoc sensor networks,” 2002 IEEE Wireless Communications and Networking Conference Record WCNC 2002 Cat No02TH8609, vol. 1, pp. 350–355, 2002.

[63] K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for self-organization of a wireless sensor network,” IEEE Personal Communications, vol. 7, pp. 16–27, 2000.

[64] C. Schurgers and M. B. Srivastava, “Energy Efficient Routing in Wireless Sensor Networks,” in IEEE Military Communications Conference, 2001. MILCOM 2001, 2001, vol. 1, pp. 357–361.

[65] S. Rani and S. H. Ahmed, Multi-hop Routing in Wireless Sensor Networks: An Overview, Taxonomy, and Research Challenges. Springer, 2015.

[66] Y.-H. Wang, Y.-W. Lin, Y.-Y. Lin, and H.-M. Chang, “A Grid-Based Clustering Routing Protocol for Wireless Sensor Networks,” in Advances in Intelligent Systems and Applications-Volume 1, Springer-Verlag Berlin Heidelberg, 2013, pp. 491–499.

[67] S. Naeimi, H. Ghafghazi, C.-O. Chow, and H. Ishii, “A survey on the taxonomy of cluster-based routing protocols for homogeneous wireless sensor networks.,” Sensors (Basel, Switzerland), vol. 12, no. 6, pp. 7350–409, Jan. 2012.

[68] M. A. Salam and F. Tanjima, “Tree-based Data Aggregation Algorithms in Wireless Sensor Networks : A Survey,” in Industrial Engineering and Operations

Management Istanbul, Turkey, 2012, pp. 1995–2002.

(29)

185

[69] W. Kui, D. Dreef, S. Bo, and X. Yang, “Secure data aggregation without persistent cryptographic operations in wireless sensor networks,” in Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference, 2006, vol. 2006, pp. 635–640.

[70] H. Ö. Tan and I. Körpeoǧlu, “Power efficient data gathering and aggregation in wireless sensor networks,” ACM SIGMOD Record, vol. 32, no. 4, p. 66, Dec. 2003.

[71] H. Zhang, P. Chen, and S. Gong, “Weighted spanning tree clustering routing algorithm based on LEACH,” in Proceedings of the 2010 2nd International Conference on Future Computer and Communication, ICFCC 2010, 2010, vol. 2.

[72] M. Ding, X. Cheng, and G. Xue, “Aggregation tree construction in sensor networks,”

2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat.

No.03CH37484), vol. 4, 2003.

[73] A. Gagarin, S. Hussain, and L. T. Yang, “Distributed search for balanced energy consumption spanning trees in wireless sensor networks,” in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, 2009, pp. 1037–1042.

[74] V. Annamalai, S. K. S. Gupta, and L. Schwiebert, “On tree-based convergecasting in wireless sensor networks,” 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003., vol. 3, 2003.

[75] F. Xiangning and S. Yulin, “Improvement on LEACH Protocol of Wireless Sensor Network,” in Sensor Technologies and Applications, 2007. SensorComm 2007.

International Conference on, 2007, pp. 260–264.

[76] V. Loscrì, G. Morabito, and S. Marano, “A two-levels hierarchy for low-energy adaptive clustering hierarchy (TL-LEACH),” in IEEE Vehicular Technology Conference, 2006, vol. 3, pp. 1809–1813.

(30)

186

[77] M. B. Yassein, A. Al-zou, Y. Khamayseh, and W. Mardini, “Improvement on

LEACH Protocol of Wireless Sensor Network (VLEACH),” International Journal of Digital Content: Technology and its Applications, vol. 3, no. 2, pp. 132–136, 2009.

[78] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application- specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, 2002.

[79] J. Hong, J. Kook, S. Lee, D. Kwon, and S. Yi, “T-LEACH: The method of threshold- based cluster head replacement for wireless sensor networks,” Information Systems Frontiers, vol. 11, pp. 513–521, 2009.

[80] H. M. Abdulsalam and L. K. Kamel, “W-LEACH: Weighted low energy adaptive clustering hierarchy aggregation algorithm for data streams in wireless sensor networks,” in Proceedings - IEEE International Conference on Data Mining, ICDM, 2010, pp. 1–8.

[81] G. Ran, H. Zhang, and G. Shulan, “Improving on LEACH Protocol of Wireless Sensor using Fuzzy Logig,” Information & Computational Science, vol. 3, no.

March, pp. 767–775, 2010.

[82] M. O. Farooq, A. B. Dogar, and G. A. Shah, “MR-LEACH: Multi-hop routing with low energy adaptive clustering hierarchy,” in Proceedings - 4th International Conference on Sensor Technologies and Applications, SENSORCOMM 2010, 2010, pp. 262–268.

[83] P. Bansal, P. Kundu, and P. Kaur, “Comparison of LEACH and PEGASIS Hierarchical Routing Protocols in Wireless Sensor Networks,” Int. J. of Recent Trends in Engineering & Technology, vol. 11, no. June, pp. 139–144, 2014.

[84] G. S. Arumugam and T. Ponnuchamy, “EE-LEACH: development of energy-efficient LEACH Protocol for data gathering in WSN,” Eurasip Journal on Wireless

Communications and Networking, vol. 2015, no. 1, pp. 1–9, 2015.

(31)

187

[85] N. Sharma and A. Nayyar, “A Comprehensive Review of Cluster Based Energy Efficient Routing Protocols for Wireless Sensor Networks,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 1, pp.

441–453, 2014.

[86] Q. Mamun, “Designing Logical Topology For Wireless Sensor Networks: A Multi- Chain Oriented Approach,” Ad hoc, Sensor & Ubiquitous Computing (IJASUC), vol.

4, no. 1, 2013.

[87] Y.-F. Huang, C.-L. Chen, N.-C. Wang, J.-Y. Lin, and C.-M. Chen, “Performance of a data gather scheme with novel chain construction for wireless sensor networks,”

Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC ’10, p. 1208, 2010.

[88] P. Madhumathy and D. Sivakumar, “A Comparative Analysis of clustering based Routing Techniques for WSN,” INTERNATIONAL JOURNAL OF SCIENTIFC &

ENGINEERING RESEARCH, vol. 3, no. 10, pp. 1–5, 2012.

[89] R. Neha and P. P. Bhattacharya, “Performance Analysis of a Concentric Cluster Based Hierarchical Routing Protocol for WSN,” International Journal of Computer Science and Mobile Computing, vol. 2, no. February, pp. 21–27, 2013.

[90] Z. Gengsheng, L. Xiaohua, and H. Xingming, “The research of clustering protocol based on chain routing in WSNs,” 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA), no. 1, pp. 292–295, Nov. 2009.

[91] G. Zheng and Z. Hu, “Chain Routing Based on Coordinates-Oriented Clustering Strategy in WSNs,” 2009 International Symposium on Computer Network and Multimedia Technology, vol. 2, no. 1, pp. 1–4, Dec. 2009.

[92] K. S. Ahn, D. G. Kim, B. S. Sim, H. Y. Youn, and O. Song, “Balanced Chain-Based Routing Protocol (BCBRP) for Energy Efficient Wireless Sensor Networks,” 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with

(32)

188

Applications Workshops, pp. 227–231, May 2011.

[93] M. Hadjila, H. Guyennet, and M. Feham, “A Chain-Based Routing Protocol to Maximize the Lifetime of Wireless Sensor Networks,” Wireless Sensor Network, vol.

05, no. 05, pp. 116–120, 2013.

[94] K. Majumder, S. Ray, and S. K. Sarkar, “A novel energy efficient chain based hierarchical routing protocol for wireless sensor networks,” in Emerging Trends in Robotics and Communication Technologies, 2010, pp. 339–344.

[95] Yongchang Yu and Yichang Song, “An Energy-Efficient Chain-Based routing protocol in Wireless Sensor Network,” in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010, vol. 11, pp.

V11–486–V11–489.

[96] J. Yang, Y. Mao, Q. Yu, and S. Leng, “Rotation and chain-based energy saving routing protocol of wireless sensor network,” 2013 International Conference on Communications, Circuits and Systems (ICCCAS), pp. 72–77, Nov. 2013.

[97] Y. Xu, J. Heidemann, and D. Estrin, “Geography-informed energy conservation for Ad Hoc routing,” in Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom ’01, 2001, pp. 70–84.

[98] R. Sheikhpour and S. Jabbehdari, “A Cluster-Chain based Routing Protocol for Balancing Energy Consumption in Wireless Sensor Networks,” International Journal of Multimedia and Ubiquitous Engineering, vol. 7, no. 2, pp. 1–16, 2012.

[99] S. Feng, B. Qi, and L. Tang, “An improved Energy-Efficient PEGASIS-Based protocol in Wireless Sensor Networks,” 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 2230–2233, Jul. 2011.

[100] F. Tang, I. You, S. Guo, M. Guo, and Y. Ma, “A chain-cluster based routing algorithm for wireless sensor networks,” Journal of Intelligent Manufacturing, vol.

(33)

189 23, no. 4, pp. 1305–1313, May 2010.

[101] D. Yi and H. Yang, “HEER – A delay-aware and energy-efficient routing protocol for wireless sensor networks,” Computer Networks, vol. 104, pp. 155–173, 2016.

[102] K. Majumder, S. Ray, and S. K. Sarkar, “A novel energy efficient chain based hierarchical routing protocol for wireless sensor networks,” Interact-2010, pp. 339–

344, Dec. 2010.

[103] L. T. M. Blessing and C. Amaresh, DRM, a Design Research Methodology. Springer- Verlag London, 2009.

[104] J. Rico, J. Valino, and E. Epifanio, “Cluster Head Assignment in Networks controlled by Gatway Entities (CHANGE),” in 27th Advanced Information Networking and Applications Workshops, 2013.

[105] M.-W. Park, J.-Y. Choi, Y.-J. Han, and T.-M. Chung, “An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks,” 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 58–61, 2009.

[106] Z. Xu, L. Chen, T. Liu, L. Cao, and C. Chen, “Balancing energy consumption with hybrid clustering and routing strategy in wireless sensor networks,” Sensors (Switzerland), vol. 15, no. 10, pp. 26583–26605, 2015.

[107] S. SUMITHRA and A. A. VICTOIRE, “An Energy Efficient Linear Chain-Based Clustering Routing Protocol For Wireless Sensor Networks,” Theoretical and Applied Information Technology, vol. 63, no. 3, 2014.

[108] S. Singh, S. Chand, and B. Kumar, “Energy Efficient Clustering Protocol Using Fuzzy Logic for Heterogeneous WSNs,” Wireless Personal Communications, vol. 86, no. 2, pp. 451–475, 2016.

[109] X. Liu, “An optimal-distance-based transmission strategy for lifetime maximization

(34)

190

of wireless sensor networks,” IEEE Sensors Journal, vol. 15, no. 6, pp. 3484–3491, 2015.

[110] W. B. Heinzelman, “Application-Speci c Protocol Architectures for Wireless Networks,” Cornell, 2000.

[111] O. Balci, “Verification validation and accreditation of simulation models,” in Proceedings of the 29th conference on Winter simulation, 1997, pp. 135–141.

[112] T. R. Henderson, S. Roy, S. Floyd, and G. F. Riley, “Ns-3 Project Goals,”

Proceeding from the 2006 workshop on ns-2: the IP network simulator - WNS2 ’06, vol. 1, p. 13, 2006.

[113] S. Kurkowski, T. Camp, and M. Colagrosso, “MANET simulation studies,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9. p. 50, 2005.

[114] A. Habbal, “TCP SINTOK: Transmission Control Protocol with Delay-Based Loss Detection and Contention Avoidance Mechanisms for Mobile AD HOC Network,”

UUM, 2014.

[115] S. Schlesinger, R. Crosby, R. Cagne, G. Innis, C. Lalwani, J. Loch, R. Sylvester, R.

Wright, N. Kheir, and D. Bartos, “Terminology for model credibility,” Simulation journal, vol. 32, pp. 103–104, 1979.

[116] R. G. Sargent, “Verification and Validation of Simulation Models,” Journal of Simulation, vol. 7, no. 1, pp. 37–48, 2013.

[117] R. Jain, The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling, vol. 491. 1992.

[118] G. OSMAN, “Scaleable And Smooth TCP-Friendly Receiver-Based Layered Multicast Protocol,” UUM, 2008.

(35)

191

[119] M. HASBULLAH, “An Innovative Signal Detection Algorithm In Facilitating The Cognitive Radio Functionality For Wireless Regional Area Network Using Singular Value Decomposition,” UUM, 2011.

[120] A. SUKI, “Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique For Video Transmission,” UUM, 2011.

[121] M. Saleem, G. a. Di Caro, and M. Farooq, “Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions,” Information Sciences, vol. 181, no. 20, pp. 4597–4624, Oct. 2011.

[122] “OMNET ++.” [Online]. Available: http://www.omnetpp.org/.

[123] “Castalia.” [Online]. Available: https://castalia.forge.nicta.com.au/index.php/en/.

[124] T. Issariyakul and E. Hossain, Introduction to Network Simulator NS2. 2011.

[125] “OPNET.” [Online]. Available:

http://www.opnet.com/university_program/itguru_academic_edition/.

[126] “Prowler.” [Online]. Available: http://www.isis.vanderbilt.edu/projects/nest/prowler/.

[127] I. ALI, KADHUM, “Distributed Coverage Optimization Techniques for Improving Lifetime of Wireless Sensor Networks,” DE-Franche-Comte, 2015.

[128] B. Musznicki and P. Zwierzykowski, “Survey of simulators for wireless sensor networks,” International Journal of Grid and Distributed Computing, vol. 5, no. 3, pp. 23–50, 2012.

[129] W. Du, F. Mieyeville, D. Navarro, I. O’Connor, and L. Carrel, “Modeling and simulation of networked low-power embedded systems: a taxonomy,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, pp. 1–12, 2014.

(36)

192

[130] H. Sundani, H. Li, V. Devabhaktuni, M. Alam, and P. Bhattacharya, “Wireless sensor network simulators a survey and comparisons,” International Journal of Computer Networks, vol. 2, no. 5, pp. 249–265, 2011.

[131] “ns-3 Network Simulator 3,” https://www.nsnam.org/documentation/, 2016. [Online].

Available: https://www.nsnam.org/documentation/.

[132] N. Kamoltham, K. N. Nakorn, and K. Rojviboonchai, “From NS-2 to NS-3 - Implementation and evaluation,” in 2012 Computing, Communications and Applications Conference, ComComAp 2012, 2012, pp. 35–40.

[133] M. Stoffers and G. Riley, “Comparing the ns-3 propagation models,” in Proceedings of the 2012 IEEE 20th International Symposium on Modeling, Analysis and

Simulation of Computer and Telecommunication Systems, MASCOTS 2012, 2012, pp.

61–67.

[134] M. Kheirkhah, I. Wakeman, and G. Parisis, “Multipath-TCP in ns-3,” in The Workshop on ns-3 (WNS3), 2014.

[135] G. Piro, N. Baldo, and M. Miozzo, “An LTE module for the ns-3 network simulator,”

Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, no. March, pp. 415–422, 2011.

[136] M. Ikeda, E. Kulla, L. Barolli, and M. Takizawa, “Wireless Ad-hoc Networks Performance Evaluation Using NS-2 and NS-3 Network Simulators,” 2011

International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 40–45, 2011.

[137] R. Fernandes and M. Ferreira, “Scalable VANET simulations with NS-3,” in IEEE Vehicular Technology Conference, 2012.

[138] S. Choudhary and A. Bhatt, “A survey of Optimized Link State Routing (OLSR) Networks Using NS-3,” Int. J. Sci. Res. Sci. Eng. Technol, vol. 1, no. 2, pp. 407–415,

(37)

193 2015.

[139] Z. Ali, N. Baldo, J. Mangues-Bafalluy, and L. Giupponi, “Simulating LTE mobility management in presence of coverage holes with ns-3,” in Proceedings of the 8th International Conference on Simulation Tools and Techniques, 2015, pp. 279–283.

[140] M. Casoni, C. A. Grazia, M. Klapez, and N. Patriciello, “Implementation and validation of TCP options and congestion control algorithms for ns-3,” in Proceedings of the 2015 Workshop on ns-3, 2015, pp. 112–119.

[141] G. Piro, L. A. Grieco, G. Boggia, and P. Camarda, “Simulating wireless nano sensor networks in the NS-3 platform,” in Proceedings - 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA, 2013, pp.

67–74.

[142] K. El Gholami, N. Elkamoun, K. M. Hou, Y. Chen, J. P. Chanet, and J. J. Li, “A new WPAN Model for NS-3 simulator,” NICST’2103 New Information Communication Science and Technology for Sustainable Development: France-China International Workshop, 18-20 Sept., p. 8, 2013.

[143] S. Lindsey, C. Raghavendra, and K. Sivalingam, “Data Gathering in Sensor

Networks using the Energy * Delay Metric,” in Parallel and Distributed Processing Symposium., Proceedings 15th International, 2001, pp. 2001–2008.

[144] P. Shiva, k B. Raja, Venugopal, I. S, and L. M. Patnaik, “Base Station Controlled Adaptive Clustering for Qos in Wireless Sensor Networks,” International Journal of Computer Science and Network Security, vol. 14, no. 2, pp. 1–9, 2014.

[145] S. Lindsey, C. Raghavendra, and K. M. Sivalingam, “Data Gathering Algorithms in Sensor Networks Using Energy Metrics,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, vol. 13, no. 9, pp. 924–935, 2002.

[146] O. M. D. Al-Momani, “Dynamic redundancy forward error correction mechanism for

(38)

194

the enhancement of Internet-based video streaming,” UUM, 2010.

[147] Y. Chen and Q. Zhao, “On the lifetime of wireless sensor networks,” IEEE Communications Letters, vol. 9, pp. 976–978, 2005.

[148] I. Kang and R. Poovendran, “Maximizing network lifetime of broadcasting over wireless stationary ad hoc networks,” Mobile Networks and Applications, vol. 10, pp.

879–896, 2005.

[149] Y. Shi, Y. T. Hou, and A. Efrat, “Algorithm design for base station placement problems in sensor networks,” Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks - QShine ’06, p. 13, 2006.

[150] I. Raicu, L. Schwiebert, S. Fowler, and S. K. S. Gupta, “Local Load Balancing for Globally Efficient Routing in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 1, no. 2, pp. 163–185, 2005.

[151] M. Perillo and W. B. Heinzelman, “General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies,” IEEE Transactions on Mobile Computing, vol. 7, pp. 484–497, 2008.

[152] D. W. Cunningham, A logical introduction to proof. New York: Springer Science &

Business Media, 2012.

[153] R. Sargent, “Verification and validation of simulation models,” in Proceedings of the 37th conference on Winter simulation, 2005, pp. 130–143.

[154] K. Akkaya, K. Akkaya, M. Younis, and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Networks, vol. 3, pp. 325–349, 2005.

[155] M. N. A. B. M. Alim Al Islam, Chowdhury Sayeed Hyder, Humayun Kabir3, “Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability

(39)

195

in Wireless Sensor Networks,” Wireless Sensor Network, vol. 02, no. 07, pp. 538–

554, 2010.

[156] T. Gao, J. Y. Song, J. Y. Zou, J. H. Ding, D. Q. Wang, and R. C. Jin, “An overview of performance trade-off mechanisms in routing protocol for green wireless sensor networks,” Wireless Networks, vol. 22, no. 1, pp. 135–157, 2016.

[157] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.

Rujukan

DOKUMEN BERKAITAN

search of Ref. [65] presented an EDAK scheme which provides less traffic overhead. This 

The objectives of this research is to study the signal propagation characteristics of WSN devices and the devices physical position that influence signal

Lao, "VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks," Networking Technologies, Services, and Protocols; Performance of Computer and

This research however is to design and develop an integrated sensor system using wireless sensor networks (WSN) to monitor stingless bee hives and their

1) To analyze the behavior of WSN mathematically, in terms of communication link metrics and their impact on network connectivity, reliability, and energy consumption. 2)

This thesis investigates ways of improving the energy efficiency of the Wireless Sensor Network (WSN) nodes by improving the time slot synchronization algorithm of the

Our P-XCAST routing protocol is based on modifying route request control packets mechanism to build the network topology and route the data packet which hold the list of

DISTRIBUTED TIME DIVISION MULTIPLE ACCESS (DTDMA) MEDIUM ACCESS CONTROL PROTOCOL FOR WIRELESS SENSOR